You are on page 1of 54

MAKERERE

UNIVERSITY

COLLEGE OF ENGINEERING, DESIGN, ART AND TECHNOLOGY Department of Electrical and Computer Engineering KEVIN ACUNGKENA Bsc Telecommunications Engineering 09/U/550

INDUSTRIAL TRAINING REPORT 18th June 2012-1st August 2012

Faculty supervisor: Mr. Nsubuga Edward Signature Date

Department supervisor: Mr. Wokulira Miyingo Edward Signature Date

ii

Declaration I Kevin Acungkena declare to the best of my knowledge that the content in this report is original and has been to the best of my ability. This work is a partial requirement to the award of a Bachelor of Science degree in Telecommunications Engineering at Makerere University Kampala.

Dedication I dedicate this report to my close friends, my volleyball team mates and my family. They have helped me come this far with my education. .

ii

Acknowledgement I am grateful to all those who contributed to my industrial training in all possible ways for their time, Inspiration and clarity most especially Mr. Nsubuga Edward who took us through the training exercise from Bukasa Telecom. The training was under the technical department transmission Bukasa telecom. I also acknowledge the advice, love and financial support from my parents and above all the hand of the Almighty God.

iii

Table of contents
COLLEGE OF ENGINEERING, DESIGN, ART AND TECHNOLOGY.....................................1 Declaration...............................................................................................................i Dedication................................................................................................................ii Acknowledgement...................................................................................................iii Table of contents.....................................................................................................iv List of figures.......................................................................................................... vi List of symbols........................................................................................................vii CHAPTER 1: INTRODUCTION.......................................................................................1 1.1 Industrial Training..............................................................................................1 1.2 Bukasa Telecom Limited ....................................................................................1 1.3 Services offered by Bukasa Telecom Limited......................................................2 1.4 Technical Department and Industrial training.....................................................2 CHAPTER 2: LITERATURE REVIEW................................................................................4 2.1: Networking........................................................................................................4 2.1.1 Basic subdivisions of a network....................................................................4 2.1.2 Reference models........................................................................................5 2.1.3 Types of Networks........................................................................................7 2.1.4 Basic hardware components........................................................................9 2.2 Routing............................................................................................................10 2.2.1 Routing protocols.......................................................................................10 2.2.2 Types of Routing........................................................................................12 2.3 Addressing.......................................................................................................13 2.3.1 Network addressing...................................................................................14 2.3.2 Subnetting.................................................................................................15 2.3.3 Network address translation (NAT).............................................................15 2.4 Wireless standards...........................................................................................16 2.5 VSAT................................................................................................................17 CHAPTER 3: PRACTICAL WORK DONE........................................................................18 3.1 Basic router configuration................................................................................18 3.1.1 The CISCO router.......................................................................................18 3.1.2 Logging into the router...............................................................................19 3.2 Configuring Network Address translation and Access List.................................21 iv

VPNs (Virtual Private Networks) configuration........................................................24 3.4 Configuring the (nano-station2) microwave radio as the access point..............27 3.4 Configuring Routing protocols ........................................................................27 Ospf ...................................................................................................................28 Border gateway protocol. (BGP)..........................................................................28 Network cabling.....................................................................................................30 3.6 Broadband coverage project............................................................................32 3.6.1 Objectives of the project............................................................................32 3.6.2 Overview of broadband..............................................................................33 3.6.3The Makerere site.......................................................................................35 3.6.4The Lubya site.............................................................................................36 3.6.5 Kisimbiri site..............................................................................................38 3.6.6 Requirements and equipment specifications at all sites;............................42 Chapter 4:................................................................................................................. 43 4.1 Challenges.......................................................................................................43 4.2 Conclusion........................................................................................................43 4.3 Recommendations...........................................................................................43 References................................................................................................................ 44

List of figures
Figure 1: Organogram of Bukasa Telecom...................................................................3 Figure 2: OSI reference model.....................................................................................6 Figure 3: Router........................................................................................................10 Figure 4: classes of IP addresses...............................................................................15 Figure 5: CISCO router...............................................................................................18 Figure 6: Basic router configuration lay out...............................................................19 Figure 7: Configuring the Kampala router..................................................................20 Figure 8: Configuring the Jinja router.........................................................................20 Figure 9: Pinging from one router to the other...........................................................21 Figure 10: NAT lay out configuration.........................................................................21 Figure 11: Configuring SEACOM router......................................................................22 Figure 12: Configuring Makerere router.....................................................................23 Figure 13: Configuring NAT on the Makerere router...................................................23 Figure 14: Configuring the Technology router............................................................24 Figure 15: VPN configuration setup...........................................................................25 Figure 16: VPN configuration on Kampala..................................................................25 Figure 17: Layer 2 Security on Kampala....................................................................26 Figure 18: VPN configuration on Nairobi Router.........................................................26 Figure 19: Interface showing the configured microwave radio...................................27 Figure 20: OSPF configuration on Kampala................................................................28 Figure 21: scenario for BGP configurarion..................................................................29 Figure 22: BGP 70 on UTL..........................................................................................29 Figure 23: BGP configuration on MTN........................................................................30 Figure 24: Straight through and cross over cables.....................................................30 Figure 25: The ethernet cable, RJ-45 and the crimping tool.......................................31 Figure 26: Sites that were visited..............................................................................35 Figure 27: Location of the Makerere site....................................................................36 Figure 28: Currently generated traffic capacity at Lubya ..........................................37 Figure 29: the instructor making analysis..................................................................38 Figure 30: The fiber access point at Lubya................................................................38 Figure 31: Availability of three phase power at Kisimbiri............................................39 Figure 32: Availability of land at Kisimbiri..................................................................40 vi

Figure 33: Low traffic intensity at Kisimbiri................................................................41 Figure 34: Distance to the main road........................................................................42

List of symbols BGP DSL GSM HAN IEEE IGP ISP LAN MAC NAT OSI OSPF PAN PSTN RIP SCADA VPN VSAT WAN Border Gateway protocol Digital Subscriber Line Global System for Mobile communications Home Area Network Institute of Electrical and Electronics Engineer Interior Gateway routing Protocol Intenet Service Provider Local Area Network Media Acess Control Network Address Translation Open Systems Interconnection Open Shortest Path First Personal Area Network Public Switched Telephone Network. Routing Information Protocol Supervisory Control And Data Acquisition Virtual Private Network Very Small Aperture Terminals Wide Area Network

vii

viii

CHAPTER 1: INTRODUCTION 1.1 Industrial Training Industrial training is a requirement for the award of the Bachelors Degree of Engineering in Telecommunications Engineering at Makerere University Uganda. The objectives of industrial training to the student are: Learning to adapt to new working environment and coping with the various working challenges. To enable them identify the job requirements and the work ethics. Development of design and technical skills by having hands on working experience at the training places and enable them attain knowledge that is not taught in schools. 1.2 Bukasa Telecom Limited BUKASA telecom is a private limited liability company incorporated in the republic of Uganda that was effectively born in January 2004 and went in operation in 2005. The company premise is currently at Ntinda plot 19 off martyrs way Kampala, Uganda. Bukasa Telecom International offers first class services to its clients in Uganda and beyond. The company currently deals in radio path profiling, upgrading and installation of CDMA telecom network, installation of RF and BTS networks, microwave radio links installation and commissioning of GSM base stations. BUKASA telecom has extensive local and international experience and its major contractors are Plessey Uganda which sub-contracts BUKASA Telecom for MTN Uganda, Huaweii Technologies, which contracts it projects for Uganda Telecom, ONATEL and TELCEL in Burundi and BUKASA Telecom is a major contractor for CELTEL Uganda. BUKASA telecom also involves in installation works of Radio and Television broadcasting.

1.2.1 Company Vision The company vision is to expand communication by embracing modern technologies with the aim of providing access at affordable costs to the entire population in Uganda and beyond. 1.2.2 Mission The mission of the company is to focus on providing quality services and improving on the lives of the clients by offering affordable communication services. 1.3 Services offered by Bukasa Telecom Limited Bukasa Telecom Ltd is a Telecommunication Company that offers various Telecom services which include Internet Providing, Installation of GSM RF network equipment from D.C Distribution, UPS. BTS, BATTERRY, BSC, RECTIFIERS, installation of Microwave links, SDH& PDH Radio. They also carry out installation of RF Cables like GSM antenna, Feeder Cables, cables between Cabinets and RF part, Omni, GPS Antennas. 1.4 Technical Department and Industrial training To keep up with the fast growing communication technologies the company makes arrangements for its technical staff refresher courses that are normally provided by the main contractors. The company also endeavours to offer training to its non-technical staff in the same services as they are recommended to have some elementary knowledge about the technical section since they work hand in hand with the technical team.

1.5 Administration and Organization Structure of Bukasa Telecom Limited

Figure 1: Organogram of Bukasa Telecom

CHAPTER 2: LITERATURE REVIEW 2.1: Networking A network is a collection of devices interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Networks may be classified according to a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology, and organizational scope. Networking can also be referred to as the interconnection of various nodes to allow communication between them. Their interconnection allows for data transfer from one node to the other, hence telecommunication. These nodes can be various BTS sites, computer terminals, among others. Networking in the telecommunication field is of great importance as;1. It allows for network resource sharing such as printers, and servers, etc. 2. It also allows for voice and data transmission cheaply as compared to the circuit switched systems. 2.1.1 Basic subdivisions of a network A network is generally subdivided into three main sectors which include Core, Transmission and Access. Core network: A core network is the central part of a telecommunication network that provides various services to customers who are connected by the access network. One of the main functions is to route telephone calls across the PSTN. Typically the term refers to the high capacity communication facilities that connect primary nodes. Core network provides paths for the exchange of information between different sub-networks. The devices and facilities in the core networks are switches and routers.

Transmission network: In telecommunications, transmission is the process of sending, propagating and receiving an analogue or digital information signal over a physical point-to-point or point-to-multipoint transmission medium, either wired, optical fibre or wireless. Transmission technologies and schemes typically refer to physical layer protocol duties such as modulation, demodulation, line coding, equalization, error control, bit synchronization and multiplexing. Access network: An access network is that part of a telecommunications network which connects subscribers to their immediate service provider. It is contrasted with the core network, (for example the Network Switching Subsystem in GSM) which connects local providers to each other. The access network may be further divided between feeder plant or distribution network, and drop plant or edge network. 2.1.2 Reference models In network development, a layered approach is used to determine how communication over the network will take place. The processes involved in communication are split into layers hence a layered architecture. The OSI reference model The OSI reference model is used in this development. However it does not only apply to the network modelling but to software development, and protocols. This model was developed by the International Organisation of Standardisation (ISO) to allow for the interoperability of network devices from different manufacturers. (Lammle, 2005) The advantages of this model include;i. ii. iii. It allows multiple vendor development through standardisation of network components. It also allows different types of network hardware and software to communicate. It prevents changes in one layer from affecting other layers, such that development is not hampered. iv. Network communication processes are divided into smaller and simpler components, thus aiding development, design and troubleshooting.

v.

Since functions at each layer are defined, industry standardisation is encouraged.

Figure 2: OSI reference model Application layer: This involves the part of the network through which the human being communicates. It comes into play when access to the network is going to be needed soon. Its also responsible for identifying the viability and availability of the intended communication partner and whether the sufficient resources for communication exist. Presentation layer: This presents data to the application layer and is responsible for data translation and code formatting. Session layer: This is responsible for setting up, managing and tearing down sessions between presentation layer entities and also provides a dialog control between devices and nodes. Transport layer: This segments and reassembles data into a data stream. Network layer: This manages device addressing, tracks the location of devices on the network and determines the best way to move data implying that it transports information between devices that
6

arent locally attached. Routers are specified at the network layer routing services at the network layer. Data link layer: This provides the physical transmission of data and also handles error notification, network topology and flow control. Physical layer: It sends and receives raw bits of information. 2.1.3 Types of Networks. Personal area network (PAN) A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. Local area network (LAN) A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet technology. LANs can be connected to Wide area network by using routers. Home area network (HAN) A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a cable TV or Digital Subscriber Line (DSL) provider. Wide area network (WAN) A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that
7

combines many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. Internetwork An internetwork is the connection of multiple computer networks via a common routing technology using routers. The Internet is an aggregation of many connected internetworks spanning the Earth. Intranets and extranets Intranets and extranets are parts or extensions of a computer network, usually a LAN. An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications that are under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. An extranet is a network that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entitiesa company's customers may be given access to some part of its intranet while at the same time the customers may not be considered trusted from a security standpoint. Internet The Internet is a global system of interconnected governmental, academic, corporate, public, and private computer networks Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP addresses) administered by the Internet Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths. Virtual private network (VPN)
8

A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point. 2.1.4 Basic hardware components Network interface cards (NIC): A NIC (network interface card) is a piece of computer hardware designed to allow computers to physically access a networking medium. It provides a low-level addressing system through the use of MAC addresses. Repeaters and hubs: A repeater is an electronic device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a hub. Repeaters work on the Physical Layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. Bridges: A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address to that port only. Switches: A network switch is a device that forwards and filters between ports (connected cables) based on the MAC addresses in the packets. A switch is distinct from a hub in that it only forwards the frames to the ports involved in the communication rather than all ports connected. A switch breaks the collision domain but represents itself as a broadcast domain. Switches make forwarding
9

decisions of frames on the basis of MAC addresses. A switch normally has numerous ports, facilitating a star topology for devices, and cascading additional switches. Some switches are capable of routing based on Layer 3 addressing or additional logical levels; these are called multilayer switches. The term switch is used loosely in marketing to encompass devices including routers and bridges, as well as devices that may distribute traffic on load or by application content. Routers: A router is an internetworking device that forwards packets between networks by processing information found in the datagram or packet (Internet protocol information from Layer 3 of the OSI Model). In many situations, this information is processed in conjunction with the routing table (also known as forwarding table). Routers use routing tables to determine what interface to forward packets (this can include the "null" also known as the "black hole" interface because data can go into it, however, no further processing is done for said data).

Figure 3: Router 2.2 Routing Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (Circuit switching), electronic data networks (such as the Internet), and transportation networks. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes, typically hardware devices called routers, hubs, bridges, gateways, firewalls, or switches. 2.2.1 Routing protocols A routing protocol is a protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network, the choice of the route being done by routing algorithms. Each router has a priori knowledge only of networks attached to it directly. A routing protocol shares this information first
10

among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the network. Although there are many types of routing protocols, three major classes are in widespread use on IP networks: Interior gateway routing via link state routing protocols, such as OSPF and IS-IS Interior gateway routing via path vector or distance vector protocols, such as IGRP and EIGRP

Exterior gateway routing. BGP v4 is the routing protocol used by the public Internet

Interior gateway routing An interior gateway protocol (IGP) is a routing protocol that is used to exchange routing information within an autonomous system The interior gateway protocols can be divided into two categories: i. ii. Distance-vector routing protocol Link-state routing protocol

Distance-vector routing protocol Distance-vector routing protocols use the Bellman-Ford algorithm. In these protocols, each router does not possess information about the full network topology. It advertises its distance value (DV) calculated to other routers and receives similar advertisements from other routers unless changes are done in local network or by neighbors (Routers). Using these routing advertisements each router populates its routing table. In the next advertisement cycle, a router advertises updated information from its routing table. This process continues until the routing tables of each router converge to stable values. Some of these protocols have the disadvantage of slow convergence. Some examples of Distance Vector routing protocol are:

11

1. 2. 3.

Routing Information Protocol (RIP) Routing Information Protocol Version 2 (RIP) Interior Gateway Routing Protocol (IGRP)

Link-state routing protocol In the case of Link-state routing protocols, each router possesses information about the complete network topology. Each router then independently calculates the best next hop from it for every possible destination in the network using local information of the topology. The collection of best next hops forms the routing table. This contrasts with distance-vector routing protocols, which work by having each node share its routing table with its neighbors. In a link-state protocol, the only information passed between the nodes is information used to construct the connectivity maps. Some examples of Link-State routing protocol are: 1. 2. Open Shortest Path First (OSPF) Intermediate system to intermediate system (IS-IS)

2.2.2 Types of Routing There are two kinds of routing which include Static and Dynamic routing. Static Routing: Static routing occurs when you manually add routes in each routers routing table. This can be done using the statement below.

Dynamic routing: Dynamic routing is majorly of five forms which are; Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (EIGRP), Boarder Gateway protocol (BGP), Open Shortest Path First (OSPF). Interior Gateway Routing Protocol (IGRP) Is a distance vector interior routing protocol (IGP) invented by Cisco. It is used by routers to exchange routing data within an autonomous system.
12

Boarder Gateway protocol (BGP)

Is the protocol which is backing the core routing decisions on the Internet. It maintains a table of IP networks or 'prefixes' which designate network reach-ability among autonomous systems (AS). It is described as a path vector protocol.

Open Shortest Path First (OSPF)

Is an adaptiverouting protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS).

Enhanced Interior Gateway Routing Protocol (EIGRP)

Is a Cisco proprietary routing protocol loosely based on their original IGRP. EIGRP is an advanced distance-vector routing protocol, with optimizations to minimize both the routing instability incurred after topology changes, as well as the use of bandwidth and processing power in the router. 2.3 Addressing There are two kinds of addresses used to identify equipment on a given network. These are: 1. Internet protocol addresses (IP) 2. Media Access Control addresses (MAC) Internet protocol (IP) addresses An IP address is a numerical identifier assigned to each machine on an IP network. It designates the specific location of a machine on the network. An IP address is a software address. IP addressing was designed in order for a host on a network to communicate with one on another network regardless of the type of LANs the hosts are participating in. Media Access Control (MAC) address A MAC address is hard coded into the network interface card of the machine and is used to find the device on a local network IP terminology

13

Bit A bit is one digit, either a 1 or a 0 Byte A byte is 7 or 8 bits. Its an ordinary 8 bit number. A byte and an octet are completely interchangeable.

Network address This is a designation used in routing to send packets to a remote network for example 10.0.0.0, 172.16.0.0 and 192.168.10.0

Broadcast address The address used by applications and hosts to send information to all nodes on a network is called the broadcast address. Examples include 255.255.255.255 which is all networks all nodes; 172.16.255.255 which is all subnets and hosts on a network.

2.3.1 Network addressing A network address uniquely identifies each network and every machine on that network shares that network address as part of its IP address. Designers of the internet decided to create classes of networks depending on the network size. For a small number of networks possessing a very large number of nodes, they created the Class A network and for a numerous number of networks with a small number of nodes was designed Class C. Subdividing an IP address into a network and a node is determined by the class designation of ones network. To ensure efficient routing, Internet designers defined a mandate for the leadingbits section of the address for each different network class. The figure below summarizes the three classes of networks.

14

Figure 4: classes of IP addresses Private IP addresses These are addresses that can be used on a private network but are not routable throughout the internet. This is designed in order to create security but also conveniently save valuable IP address space. 2.3.2 Subnetting Subnetting is a set of techniques used to efficiently divide the address space of a unicast address prefix for allocation among the subnets of an organization network. The fixed portion of a unicast address includes the bits up to and including the prefix length that have a defined value. The variable portion of a unicast address prefix includes the bits beyond the prefix length that are set to 0. Subnetting makes use of the variable portion of a unicast address prefix to create address prefixes that are more efficient for assignment to the subnets of an organization. 2.3.3 Network address translation (NAT) NAT operates on a Cisco routergenerally only connecting two networks togetherand translates your private (inside local) addresses within the internal network, into public (inside global) addresses before any packets are forwarded to another network. This functionality gives you the option to configure NAT so that it will advertise only a single address for your entire

15

network to the outside world. Doing this effectively hides the internal network from the whole world really well, giving you some much-needed additional security. To allow for IP reuse over the internet and to allow for more uses, some IP addresses were reserved for private us within private networks in each class as the rest were left for public use and these are refered to as public addresses. It is public addresses used over the internet. Furthermore, the ISP assigns each customer only one public IP address to connect to them. This address is usually assigned to the customers network edge router (Gateway router). This however means that the private addresses should be translated into public ones for those user to access the internet. This is done using the network address translation (NAT). NAT translates all outing source address to a single public address assigned to that customer and also all in-bound destination addresses to corresponding private addresses. NAT is configured at the edge router to execute this fuunction 2.4 Wireless standards Some of the wireless standards we looked at are shown below. Standard Data Rate IEEE 802.11 Modulation Scheme Security WEP & WPA Pros/Cons & More Info This specification has been extended into 802.11b. Products that adhere to this standard are considered "Wi-Fi Certified." Eight available channels. Less potential for RF interference than 802.11b and 802.11g. Better than 802.11b at supporting multimedia voice, video and large-image applications in densely populated user environments. Relatively shorter range than 802.11b. Not interoperable with 802.11b. Products that adhere to this standard are considered "Wi-Fi Certified." Not interoperable with 802.11a. Requires fewer access points than 802.11a for coverage of large areas. Offers high-speed access to data at up to 300 feet from base station. 14 channels
16

Up to 2Mbps in FHSS or DSSS the 2.4GHz band

IEEE 802.11a (Wi-Fi)

Up to 54Mbps in OFDM the 5GHz band

WEP & WPA

IEEE 802.11b (Wi-Fi)

Up to DSSS with CCK WEP & 11Mbps in WPA the 2.4GHz band

available in the 2.4GHz band (only 11 of which can be used in the U.S. due to FCC regulations) with only three non-overlapping channels. Products that adhere to this standard are considered "Wi-Fi Certified." May replace 802.11b. Improved security enhancements over 802.11. Compatible with 802.11b. 14 channels available in the 2.4GHz band (only 11 of which can be used in the U.S. due to FCC regulations) with only three nonoverlapping channels.

IEEE 802.11g (Wi-Fi)

Up to OFDM above 54Mbps in 20Mbps, DSSS WEP & the 2.4GHz with CCK below WPA band 20Mbps

2.5 VSAT VSAT is an abbreviation for a Very Small Aperture Terminal. It is basically a two-way satellite ground station with a less than 3 meters tall (most of them are about 0.75 m to 1.2 m tall) dish antenna stationed. The transmission rates of VSATs are usually from very low and up to 4 Mbit/s. These VSATs' primary job is accessing the satellites in the geosynchronous orbit and relaying data from terminals in earth to other terminals and hubs. They will often transmit narrowband data, such as the transactions of credit cards, polling, RFID (radio frequency identification ) data,

and SCADA (Supervisory Control and Data Acquisition), or broadband data, such as satellite Internet, VoIP, and videos. However, the VSAT technology is also used for various types of communications.

17

CHAPTER 3: PRACTICAL WORK DONE 3.1 Basic router configuration 3.1.1 The CISCO router You can connect to a Cisco router to configure it, verify its configuration, and check statistics. There are different ways to do this.

The console port is usually an RJ-45 (8-pin modular) connection located at the back of the routerby default, theres no password set.

You can also connect to a Cisco router through an auxiliary port The third way to connect to a Cisco router is in-band, through the program. Telnet is a terminal emulation program that acts as though its a dumb terminal. You can use Telnet to connect to any active interface on a router, such as an Ethernet or serial port.

Figure 5: CISCO router

18

The Cisco IOS was created to deliver network services and enable networked applications. It runs on most Cisco routers and on an ever-increasing number of Cisco Catalyst switches, such as the Catalyst 2950. Some of the important things that the Cisco router IOS software is responsible for include Carrying network protocols and functions Connecting high-speed traffic between devices Adding security to control access and stop unauthorized network use Providing scalability for ease of network growth and redundancy Supplying network reliability for connecting to network resources

We connected to the router using the command line interface enabled by the use of software called GNS3 as the CISCO IOS. The following screen shots show the command line interface configuration. They show the status of the router interfaces at the end of each command. 3.1.2 Logging into the router We were expected to connect to routers and enable them communicate. In this scenario, the initial router configuration was carried out. This involved configuring the following: Host name Passwords (Secret and telnet) Interfaces The routers were arranged as shown in the figure below.

Figure 6: Basic router configuration lay out

19

Figure 7: Configuring the Kampala router

Figure 8: Configuring the Jinja router The console enables you to put passwords and secrets and if the two routers are connected, once you ping one router from the other, it should show that packets are being transferred as shown below.

20

Figure 9: Pinging from one router to the other 3.2 Configuring Network Address translation and Access List In doing so we had three routers: 1) From an ISP called SEACOM 2) Makerere Router 3) Department router The following configuration included applying Network Address Translation, access lists and putting a default gateway for the Makerere Router. The Makerere router is the point at which other compasses like CEDAT receive internet connectivity. This router however receives internet connectivity from the Seacom router. The scenario is as shown in the figure below.

Figure 10: NAT lay out configuration NAT is only needed at the Makerere router since it contains public IP addresses that are translated to private IP addresses at the department (technology).

21

Figure 11: Configuring SEACOM router

22

Figure 12: Configuring Makerere router

Figure 13: Configuring NAT on the Makerere router

23

Figure 14: Configuring the Technology router VPNs (Virtual Private Networks) configuration A virtual private network is a private network over the network. It is configured to be accessed by specific individuals with the right credentials. 3.3.1Importance of VPN: For security and data protection. Uses encryption at both ends.

Encryptiom methods; md5


24

We also looked at access lists; Standard access lists Extended access lists. The command is: Crypto isakmp policy 1 Hash md5 Authentication pre-share Exit Crypto isakmp key KAMPALA address (net hop ip address)

Figure 15: VPN configuration setup...

Figure 16: VPN configuration on Kampala

25

Layer 2 security. Using wildcard masks and access list. Deals with network to network (internal networks) (conf)Crypto ipsec transform-set stanbic ah-sha-hmac esp-des Crypto map kla 1 ipsec-isakmp

Figure 17: Layer 2 Security on Kampala On the Nairobi router,

Figure 18: VPN configuration on Nairobi Router

26

3.4 Configuring the (nano-station2) microwave radio as the access point It is capable of transmitting to 10km. the radio had the following specifications. An IP address of 192.168.1.20, using an Ethernet cable, we powered the radio using a power over Ethernet cable. When configuring the cable the following procedure was followed: Power the radio Reset the IP address Configure the network. Input the MAC id.

The radio operated on the 802.11 wireless standard. We set the data rate to 54 and enabled a primary DNS of 196.0.50.50 and a secondary DNS of 196.0.3.70. The picture shows the display if the configured radio.

Figure 19: Interface showing the configured microwave radio

3.4 Configuring Routing protocols Configuring IGRP Routing The command used to configure IGRP is the same as the one used to configure RIP routing with one important difference: you use an autonomous system (AS) number. All routers within an

27

autonomous system must use the same AS number, or they wont communicate with routing information. Heres how to turn on IGRP routing:
1. Lab A#config t 2. Lab A (config) #router igrp 10 3. Lab A (config-router) #network 192.168.10.0

4. Notice that the configuration in the above router commands is as simple as in RIP routing except that IGRP uses an AS number. This number advertises only to the specific routers you want to share routing information with.

Ospf Open shortest path first is a link-state routing protocol used on routers to determine path for packets. Ospf determines the best route based on the link state at the time. It also allows routers to send their routing tables to other routers connected to it advertising routes in it to them. It is a dynamic routing protocol hence automatically changes its routing table depending on the link state.

Figure 20: OSPF configuration on Kampala The networks shown in the diagram above are those connected to the Kampala router. The same is done for the other router, while putting those networks connected to them. Border gateway protocol. (BGP) Border routers are those at the network edge routing traffic out or into the network. BGP allows these routers to acquire network status updates. The area served by the border gateway is know as an autonomus system (AS). BGP advertises the internal networks served by one gateway router to the neighboring border router in a different Autonomus system.

28

The AS number is used to advertise the destination of the traffic. Usually, ISPs are assigned these autonomus numbers. Scenario for BGP configuration.

Figure 21: scenario for BGP configurarion

Figure 22: BGP 70 on UTL The neighbour is the adjacent router interface, in a different autonomous system in this case MTN AS number 80. Public ip addresses are assigned by specific registration bodies such as AFRINIC for Africa. Each Isp is assigned a bundle of addresses in a specified AS number. The ISP is responsible for all the assigned addresses and the traffic therein. This AS is managed by a border gateway router which will only advertise the AS number to neighbouring Border routers. This is done by BGP. Border routers peer with each other to communicate.

29

Figure 23: BGP configuration on MTN Network cabling How to make an ethernet cable Purchasing fully made Ethernet cables from the store can be quite expensive. It is far easier to simply buy a box of bulk Category 5 Ethernet cable and then attach your own RJ-45 connectors to the cut ends to your preferred length.
a) There are two kinds of Ethernet cables that can make that is Straight Through and

Crossover. STRAIGHT THROUGH - Ethernet cables are the standard cable used for almost all purposes, the color schemes are the same at both terminals.

Figure 24: Straight through and cross over cables


b) CROSSOVER CABLES - The purpose of a Crossover Ethernet cable is to directly connect

one computer to another computer (or device) without going through a router, switch or hub. The following equipment was used Bulk Ethernet Cable - Category 5 or CAT5 Bulk RJ45 Crimpable Connectors RJ-45 Crimping tool

30

Figure 25: The ethernet cable, RJProcedure

45 and the crimping tool

a) Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a

razor blade that we used to cut the cable.

b) Unwind and pair of the similar colours.

c) Pinched the wires between my fingers and straighten them out as shown.

d) Pushed the wires into the connector. Noted the position of the blue plastic shielding. Also noted how the wires go all the way to the end.

31

e) A view from the top. All the wires are all the way in. There are no short wires. Carefully placed the connector into the Ethernet Crimper and cinch down on the handles tightly. The copper splicing tabs on the connector pierced into each of the eight wires. There is also a locking tab that holds the blue plastic sleeve in place for a tight compression fit. When I removed the cable from the crimper, the cable was ready to use.

f) For a standard cable, repeated all steps on the other end of the Ethernet cable exactly. 3.6 Broadband coverage project 3.6.1 Objectives of the project The main objectives of carrying out the project are as follows: To reduce telecomm costs i.e. power, security, cost of radios etc. To unify the transmission network into a single unit. To increase broadband coverage capacity for greater Kampala. To ensure that all base stations are run by a Giga-Ethernet interface. To maintain Service Level Agreement (SLA) of 99.9%. To meet high demand for bandwidth.

32

3.6.2 Overview of broadband Today's common definition of broadband is any circuit significantly faster than a dial-up phone line. That tends to be a cable modem circuit from your friendly local cable TV provider, a DSL circuit, a T-1 or an E-1 circuit from your friendly local phone company. In short, the term "broadband" can mean anything you want it to be so long as it's "fast." In short, broadband is now more a marketing term than a technical term. Broadband refers to a communication bandwidth of at least 256 Kbps. Each channel is 6 MHz wide and it uses an extensive range of frequencies to effortlessly relay and receive data between networks. In telecommunications, a broadband signalling method is one that handles a wide band of frequencies. Broadband is a relative term, understood according to its context. The wider (or broader) the bandwidth of a channel, the greater the information-carrying capacity, given the same channel quality. The term broadband in our case study will be any high speed data links needed in an area. This is because the telecom industry is no longer about voice only; there are various new multimedia services. These services require a lot of bandwidth and high speed transmission links. For example, a video conference should not take a lot of time buffering as time lags cause inconveniences. In this survey we are expected to put into consideration the following: In some case scenarios, we assume there are no base stations present, And in some, we strengthen the capacities of the existing base stations.

As there exists about 5 telecom companies, and at each site, each company has a base station, a generator, and a piece of land, if the total number of base stations at a site were reduced, the following could be achieved; Reduction in telecom costs. Reduction in power bills as lesser generators are used. Reduction in the number of radios used at a site per provider. Reduction in the cost of land acquisition.
33

We set out to a site in Lubya. At this site location, we were expected to answer questions such as; 1. How many providers are in the location and the disadvantage associated with this are: 2. The number of access (current traffic location). 3. Existence of fiber links. 4. Existence of three phase power. 5. What changes we could make to the existing plan. The disadvantages of having many base stations in a small area are: Increased risk of radioactive interference to the surrounding inhabitants. Greater power consumption. Increase in the levels of noise due to the many generators. Wastage of man power for example the security guards could be deployed elsewhere as they are redundant on site. At the start of the survey, we made a map we would follow. The three sites we visited are located as shown in figure 1.

34

Figure 26: Sites that were visited.

3.6.3The Makerere site At this site, there are 5 base stations as shown in the figure. At this site, there was availability of three phase power and the site is easily accessible. The main problem with this site is that it is near a school and the children are under constant radiation otherwise, it is a very good location for a base station. The site is located at Latitude 020'19.00"N and Longitude 3233'55.32"E. its elevation above sea level is 4149 ft.

35

Figure 27: Location of the Makerere site 3.6.4The Lubya site Lubya hill is found on latitude of N 019.8441, Longitude of lubya is 32E 32.7117, Altitude is 4174ft. The view of Lubya hill from Google earth is as shown in the figure 28. Observations during the study at Lubya At the site we found four base stations, three phase power supply was also available and noted that there was land available. It was also noted that the place had good accessibility with land available for our site. There was a three phase power line extending to the site and a fibre cable belonging to Airtel. There were four masts; three of them were using at least two microwave radios for transmission. Requirements for the broadband site at Lubya We needed land of dimensions 10by 10 meters, this is the space required to set up the tower, the house needed to house the equipment like routing engines and others

36

The land owner has to be known such that he can be contacted to know the amount of money needed for it to be leased

Towers of height 50m Small structure that can house racks for the different operators. Two generators will be required where one is for backup in case the first one fails Two rectifiers A battery bank The site will have a radio capacity of 1500MB capacity.

Figure 28: Currently generated traffic capacity at Lubya

37

Figure 29: the instructor making analysis

Figure 30: The fiber access point at Lubya. 3.6.5 Kisimbiri site The site is located at Latitude 024'35.00"N and Longitude 3228'0.07"E. its elevation above sea level is 3918 ft. The site is easily accessible from the main road.
38

Observations at Kisimbiri There was a transformer on site indicating the availability of three phase power.

Figure 31: Availability of three phase power at Kisimbiri

39

There was availability of land to set up sites as shown in figure 34

Figure 32: Availability of land at Kisimbiri There was no fiber access point indicating that we would have to create a fiber link. This can be possible by digging from the main road if there is a fiber access point along the road. The population in the surrounding area is very low indicating low traffic intensity.

40

Figure 33: Low traffic intensity at Kisimbiri


Plans for the broadband site at Kisimbiri

A piece of land of dimensions 10by 10 meters is required to set up the tower, a small house needed to house the equipment like routing engines and others

We planned for a site with 600MB capacity. We needed two 30-40kVA generators. We made an assumption that there will be future development from the low traffic to high.

Solutions to any problems at Kisimbiri Seeing that there was no fiber access point near the site, it was necessary to estimate the distance from the site to the main road as 2km with the assumption that the main road has an access point. This is so as to determine how much fiber is needed to be laid in terms of the cost of the installation. The location of the site from the main road is as shown

41

Figure 34: Distance to the main road

3.6.6 Requirements and equipment specifications at all sites; Land: All areas had available land for the site. Power Requirements; At all sites, there was availability of three phase power, hence the generators. The generators to be used have the following specifications 30 or 40kVA generators will be needed at Kisimbiri. Cable Internetworking; At Lubya hill, fiber was available hence it would be the major transmission media unlike Kisimbiri where fiber would have to be dug from the main road to the site. Security; All the sites had security personnel who could be used as guards if the new site comes up.

42

Chapter 4: 4.1 Challenges i. It was difficult for most of the trainees to get involved in the training process due to limited tools and equipment. ii. Most of the concepts covered during training were very new and this posed a great challenge to the trainees because and difficult to keep up with the trainer during the training process. iii. Due to lack of insurance we missed chances of climbing up the towers to do some installations.

4.2 Conclusion Training with Bukasa Telecom Limited was a great eye opener where there was opportunity to appreciate the practical work done in the field and relate it to the theory covered in class including learning about the technological advancements in the telecommunications engineering field. Developed working relations and got to learn more of the working ethics and discipline, also got new friends as well as gaining more confidence in practical skills. It stimulated my thinking ability and as such learning how to work while considering practically viable options. All in all it was a wonderful experience.

4.3 Recommendations The College of Engineering Design Art and Technology should come up with a more convenient and strategic way of industrial training placement since a lot of time is wasted within the first weeks of training as students try to place themselves in different organizations. The university should introduce a system where by students are insured because some of the companies could not train students because they were not insured.

43

References Cisco Certified Network Associate Study Guide 5th Edition by Todd Lammle Wikipedia.com

44

You might also like